Malware ‘Cocktails’ Raise Attack Risk

Haythem Elmir
0 1
Read Time3 Minute, 38 Second

Malware mash-ups hiding in encrypted traffic are boosting attack numbers and increasing the danger to data, according to recent reports.

It was good while it lasted. The drop in malware attacks seen in 2016 – from 8.19 billion in 2015 to 7.87 billion – is but a fond memory, as 2017 saw more than 9.3 billion attacks, according to new data from SonicWall.

Those attacks included old favorites along with more than 12,500 new CVEs (Common Vulnerabilities and Exposures), of which 78% were network-borne attacks, SonicWall said in its latest threat report. These numbers are in line with data in McAfee Labs’ newly published Threat Report, which saw 63.4 million new malware reports in the fourth quarter of 2017 alone.

The « old favorites » piece is important. According to SonicWall CEO Bill Conner, « New malware is down, but the number of variants is up. » And the number of variants appears to be growing. « Last year we were seeing about 500 a day new variants. In February, they had gone to 700 day, » he says.

It’s not like the variant writers were creative, though – many of the iterations are mash-ups of existing malware. « The variants have gone down in terms of exploit kits, but new malware cocktails are going up, » says Conner.

The growth of « malware cocktails » in part is due to the rise in ransomware-as-a-service operations around the world. That’s bad news because ransomware-as-a-service allows less programming-skilled actors into the malware game, and some targets are twice-victimized. « About half of the [ransomware victims] did pay, but even among those who paid many weren’t able to get their data back because the variants didn’t contain all the keys, » Conner says.

And whether from seasoned programmers or opportunistic newcomers, the incidence of ransomware is increasing. McAfee reports a 59% increase in ransomware year over year, with the rate of growth increasing in time, as the fourth quarter alone saw a 35% increase.

Hidden in plain sight

Another growing trend shown in the report is that of encrypted malware, or malware hidden in the encrypted stream of information flowing in and around a business. According to SonicWall’s report, in 2017, the use of encrypted sessions grew 24% over 2016 and accounted for 68% of overall sessions. That rise in encrypted sessions may indicate a sense of security that has raced ahead of reality. « A lot of people think that if they see the yellow lock or the green browser bar, they’re safe. But we’ve now seen that that’s not true, » Conner says.

He says there are at least 600 sources of encryption on the Web for malware authors to use. And the heightened sense of security that legitimate users feel when encrypted files are used helps criminals as well. « The more people don’t look at encrypted files, the more the bad guys will use it, » he explains.

Criminal use of encryption has led some to call for limits on encryption strength, or built-in backdoors in encryption schemes.

One security expert who doesn’t feel that there should be limits on encryption is former Secretary of Homeland Security Michael Chertoff. « As a general matter I would not limit the encryption that people can use, » he says, explaining that the only legitimate limits he sees to encryption are the capabilities of the hardware on which the system is running. « People should use whatever encryption they can on their system without inducing excessive latency. »

Excessive latency is just one of the issues that can be induced by any of a number of hardware and software vulnerabilities that have fed exploits and intrusions in the last year. While Intel’s Meltdown and Spectre got the majority of the press, they weren’t the only vulnerabilities that warranted inclusion in the SonicWall report.

Conner says that the continuing existence of vulnerabilities means that industry response is critical. « A company under investigation needs to declare [the fact]. The sooner we can know vulnerabilities the sooner we can have rapid response as an industry to see how the technology can be used to limit the damage. Early notification and transparency are very important, » he says.

To read the original article:

https://www.darkreading.com/endpoint/privacy/malware-cocktails-raise-attack-risk/d/d-id/1331256?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
100 %

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%

Laisser un commentaire

Next Post

LARGE SCALE TROJAN ATTACKS SEEK CRYPTOCURRENCY

Despite Russia’s growing comfort with the crypto industry, they suffered large-scale attacks from cybercriminals attempting to install crypto mining malware this week. Nearly half a million computers experienced a persistent 12 hour attack. The attack was easily foiled On March 6, a large-scale attack on over 400 thousand PC’s took […]